Asia Pacific University Library catalogue


Refine your search

Your search returned 196 results.

|
1.
Introduction to security and network forensics / William J. Buchanan.

by Buchanan, William.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boca Raton, FL : CRC Press, c2011Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 B83 2011 c.1 (4).
  (1 votes)
2.
Security for Web services and service-oriented architectures / Elisa Bertino ... [et al.].

by Bertino, Elisa.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Heidelberg [Germany] ; New York : Springer, c2010Online access: Table of contents | Contributor biographical information | Publisher description Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 S43 2010 c.1 (1).

3.
Protect your digital privacy! : survival skills for the information age / Glee Harrah Cady, Pat McGregor.

by Cady, Glee Harrah | McGregor, Pat.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: [Indianapolis] : Que, c2002Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 C33 2002 c.1 (2).

4.
Computer and communications security : strategies for the 1990s / James Arlin Cooper.

by Cooper, James Arlin.

Series: McGraw-Hill communications seriesMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : Intertext Publications, McGraw-Hill, c1989Availability: No items available : Withdrawn (2).

5.
Inside the security mind : making the tough decisions / Kevin Day.

by Day, Kevin, 1975-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Prentice Hall, c2003Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 D39 2003 c.1 (1).

6.
Network security : a hacker's perspective / Ankit Fadia.

by Fadia, Ankit, 1985-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Delhi : Macmillan India LTD., c2003Availability: No items available : Withdrawn (1).

7.
Unofficial guide to ethical hacking / Ankit Fadia.

by Fadia, Ankit, 1985-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Delhi : Macmillan, 2001Other title: Ethical hacking.Availability: No items available : Withdrawn (1).

8.
UNIX system security : how to protect your data and prevent intruders / Rik Farrow.

by Farrow, Rik, 1950-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Reading, Mass. : Addison-Wesley Pub. Co., c1991Availability: No items available : Withdrawn (1).

9.
The art of deception : controlling the human element of security / Kevin D. Mitnick and William L. Simon ; foreword by Steve Wozniak.

by Mitnick, Kevin D. (Kevin David), 1963- | Simon, William L, 1930-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : Wiley, c2002Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 M58 2002 c.1 (1). Withdrawn (1).

10.
Security in computing / Charles P. Pfleeger.

by Pfleeger, Charles P, 1948-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. ; London : Prentice-Hall International, c1997Availability: No items available : Withdrawn (1).

11.
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.

by Pfleeger, Charles P, 1948- | Pfleeger, Shari Lawrence.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Prentice Hall PTR ; 2003Availability: No items available : Withdrawn (3).

12.
The secured enterprise : protecting your information assets / Paul Proctor, and F. Christian Byrnes.

by Proctor, Paul E | Byrnes, F. Christian.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, NJ : Prentice Hall PTR, c2002Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 P76 2002 c.1 (2). Withdrawn (1).

13.
Java security / Harpreet Sethi, with NIIT.

by Sethi, Harpreet | ebrary, Inc.

Material type: Text Text; Format: electronic available online remote; Literary form: Not fiction Publication details: Cincinnati, Ohio : Premier Press, c2002Availability: Items available for loan: APU LibraryCall number: QA76.73.J38 S48 2002 c.2 (1). Withdrawn (1).

14.
PC fear factor : the ultimate PC disaster prevention guide / Alan Luber.

by Luber, Alan D, 1951-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : Que Pub., c2003Availability: Items available for loan: APU LibraryCall number: QA76.9.D348 L83 2003 c.1 (3).

15.
Introduction to security : operations and management / P.J. Ortmeier.

by Ortmeier, P. J | Ortmeier, P. J. Security management.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2009Availability: Items available for loan: APU LibraryCall number: HV8290 .O78 2009 c.2 (1). Lost (1).

16.
Virtualization and forensics : a digital forensic investigator's guide to virtual environments / Diane Barrett, Gregory Kipper.

by Barrett, Diane | Kipper, Gregory.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Amsterdam ; Boston : Syngress/Elsevier, c2010Availability: Items available for loan: APU LibraryCall number: HV8079.C65 B37 2010 c.1 (3).

17.
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data / Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray.

by Lillard, Terrence.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Burlington, MA : Syngress, c2010Availability: Items available for loan: APU LibraryCall number: HV8079.C65 D54 2010 c.4 (5).

18.
Advanced persistent threat : understanding the danger and how to protect your organization / Dr. Eric Cole.

by Cole, Eric.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Waltham, MA : Syngress, c2013Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 C65 2013 c.1 (2).

19.
Open source e-mail security / Richard Blum.

by Blum, Richard, 1962-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Ind. : SAMS, c2002Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 B58 2002 c.1 (2).

20.
Security engineering : a guide to building dependable distributed systems / Ross J. Anderson.

by Anderson, Ross, 1956-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, IN : Wiley Pub., c2008Online access: Publisher description | Table of contents only Availability: Items available for loan: APU LibraryCall number: QA76.9.A25 A53 2008 c.1 (3).